mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 05:28:59 +00:00
80 lines
2.8 KiB
JSON
80 lines
2.8 KiB
JSON
{
|
|
"id": "CVE-2024-11075",
|
|
"sourceIdentifier": "psirt@sick.de",
|
|
"published": "2024-11-19T14:15:17.340",
|
|
"lastModified": "2024-11-19T21:57:32.967",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A vulnerability in the Incoming Goods Suite allows a user with unprivileged access to the underlying system (e.g. local or via SSH) a privilege escalation to the administrative level due to the usage of component vendor Docker images running with root permissions. Exploiting this misconfiguration leads to the fact that an attacker can gain administrative control. over the whole system."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad en Incoming Goods Suite permite a un usuario con acceso sin privilegios al sistema subyacente (por ejemplo, local o a trav\u00e9s de SSH) una escalada de privilegios al nivel administrativo debido al uso de im\u00e1genes Docker del proveedor de componentes que se ejecutan con permisos de superusuario. La explotaci\u00f3n de esta configuraci\u00f3n incorrecta permite que un atacante obtenga control administrativo sobre todo el sistema."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "psirt@sick.de",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
|
"baseScore": 8.8,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.0,
|
|
"impactScore": 6.0
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "psirt@sick.de",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-250"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF",
|
|
"source": "psirt@sick.de"
|
|
},
|
|
{
|
|
"url": "https://sick.com/psirt",
|
|
"source": "psirt@sick.de"
|
|
},
|
|
{
|
|
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
|
"source": "psirt@sick.de"
|
|
},
|
|
{
|
|
"url": "https://www.first.org/cvss/calculator/3.1",
|
|
"source": "psirt@sick.de"
|
|
},
|
|
{
|
|
"url": "https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0005.json",
|
|
"source": "psirt@sick.de"
|
|
},
|
|
{
|
|
"url": "https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0005.pdf",
|
|
"source": "psirt@sick.de"
|
|
}
|
|
]
|
|
} |